Sciweavers

2945 search results - page 7 / 589
» Designing and Implementing Malicious Hardware
Sort
View
108
Voted
EUROCAST
2001
Springer
73views Hardware» more  EUROCAST 2001»
15 years 8 months ago
Integrated Design and Implementation of Digital Controllers
Pedro Albertos, Alfons Crespo
99
Voted
ASPDAC
2010
ACM
125views Hardware» more  ASPDAC 2010»
15 years 1 months ago
Design and chip implementation of an instruction scheduling free ubiquitous processor
Masa-Aki Fukase, Ryosuke Murakami, Tomoaki Sato
142
Voted
WCNC
2008
IEEE
15 years 9 months ago
A Stochastic Model for Misbehaving Relays in Cooperative Diversity
—Existing cooperative diversity protocols are designed with the inherent assumption that users exhibit cooperative behavior all the time. However, in a practical cooperative wire...
Sintayehu Dehnie, Nasir D. Memon
205
Voted
ISJGP
2010
15 years 22 days ago
On the Hardware Implementation Cost of Crypto-Processors Architectures
A variety of modern technologies such as networks, Internet, and electronic services demand private and secure communications for a great number of everyday transactions. Security ...
Nicolas Sklavos
109
Voted
ACSAC
2009
IEEE
15 years 10 months ago
Analyzing and Detecting Malicious Flash Advertisements
—The amount of dynamic content on the web has been steadily increasing. Scripting languages such as JavaScript and browser extensions such as Adobe’s Flash have been instrument...
Sean Ford, Marco Cova, Christopher Kruegel, Giovan...